Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Överbelastningsattacker genom öppna reläer
Linnaeus University, Faculty of Technology, Department of Computer Science.
Linnaeus University, Faculty of Technology, Department of Computer Science.
2014 (Swedish)Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesisAlternative title
Denial of Service Attacks Through Open Relays (English)
Abstract [sv]

Detta arbete behandlar en specifik typ av överbelastningsattack som blir allt mer populär. Dessa attacker utförs genom öppna reläer med syftet att få ut en avsevärt mycket högre effekt än den som annars är uppnåbar. Granskning av attacker utförda genom tjänsterna DNS och NTP har utförts med syftet att ge en klar bild av hur allvarligt hotet är och även klargöra hur en systemadministratör kan säkra tjänsterna för att skydda både sina egna och andras resurser. Resultaten av undersökningar visar att en attack utförd genom en DNS-tjänst ger under optimala förhållanden en amplifikationsfaktor av "102.4" och en attack genom en NTP-tjänst ger under optimala förhållanden en amplifikationsfaktor av "229.16". Resultaten visar även att problemet kan lösas helt eller delvis genom att begränsa tillåtna nätverk eller stänga av rekursion i DNS och kommandon i NTP.

Abstract [en]

This work concerns a specific type of Denial of Service attack which is becoming increasingly popular. These attacks are carried out through open relays with the purpose of getting a significantly higher effect than otherwise achievable. Examination of attacks carried out through the services DNS and NTP have been conducted with the purpose of providing a clear picture of how serious the threat is and also clarify how a system administrator can secure the services to protect both their own and others resources. The results of our studies show that an attack performed through a DNS service gives under optimal conditions a amplification factor of "102.4" and an attack through a NTP service gives under optimal conditions a amplification factor of "229.16". The results also show that the problem can be solved in whole or in part by limiting the allowed network or disable recursion in DNS and commands in NTP.

Place, publisher, year, edition, pages
2014. , 29 p.
Keyword [en]
DoS, DDoS, Amplification attack, DNS, NTP
Keyword [sv]
DoS, DDoS, Överbelastningsattack, Amplifikationsattack, DNS, NTP
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:lnu:diva-34909OAI: oai:DiVA.org:lnu-34909DiVA: diva2:723161
Subject / course
Computer Science
Educational program
IT Technician, 120 credits
Supervisors
Examiners
Available from: 2014-06-23 Created: 2014-06-10 Last updated: 2014-06-23Bibliographically approved

Open Access in DiVA

Överbelastningsattacker geom öppna reläer(1130 kB)176 downloads
File information
File name FULLTEXT01.pdfFile size 1130 kBChecksum SHA-512
1706e1ab951b943eb26fe0213af0fffe4e31f201bbbf6eaceb255cffb2125c2692641a6af485c244ea0e6dab9f096b3514f9a7cd5af70cd040a6cb72489dd3d7
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Göran, GustafssonSebastian, Lundberg
By organisation
Department of Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 176 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 261 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf